package aws import ( "encoding/json" "fmt" "io/ioutil" "log" "net/http" "net/http/httptest" "os" "testing" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/aws/credentials/ec2rolecreds" "github.com/aws/aws-sdk-go/service/iam" "github.com/aws/aws-sdk-go/service/sts" ) func TestAWSGetAccountInfo_shouldBeValid_fromEC2Role(t *testing.T) { resetEnv := unsetEnv(t) defer resetEnv() // capture the test server's close method, to call after the test returns awsTs := awsEnv(t) defer awsTs() closeEmpty, emptySess, err := getMockedAwsApiSession("zero", []*awsMockEndpoint{}) defer closeEmpty() if err != nil { t.Fatal(err) } iamConn := iam.New(emptySess) stsConn := sts.New(emptySess) part, id, err := GetAccountInfo(iamConn, stsConn, ec2rolecreds.ProviderName) if err != nil { t.Fatalf("Getting account ID from EC2 metadata API failed: %s", err) } expectedPart := "aws" if part != expectedPart { t.Fatalf("Expected partition: %s, given: %s", expectedPart, part) } expectedAccountId := "123456789013" if id != expectedAccountId { t.Fatalf("Expected account ID: %s, given: %s", expectedAccountId, id) } } func TestAWSGetAccountInfo_shouldBeValid_EC2RoleHasPriority(t *testing.T) { resetEnv := unsetEnv(t) defer resetEnv() // capture the test server's close method, to call after the test returns awsTs := awsEnv(t) defer awsTs() iamEndpoints := []*awsMockEndpoint{ { Request: &awsMockRequest{"POST", "/", "Action=GetUser&Version=2010-05-08"}, Response: &awsMockResponse{200, iamResponse_GetUser_valid, "text/xml"}, }, } closeIam, iamSess, err := getMockedAwsApiSession("IAM", iamEndpoints) defer closeIam() if err != nil { t.Fatal(err) } iamConn := iam.New(iamSess) closeSts, stsSess, err := getMockedAwsApiSession("STS", []*awsMockEndpoint{}) defer closeSts() if err != nil { t.Fatal(err) } stsConn := sts.New(stsSess) part, id, err := GetAccountInfo(iamConn, stsConn, ec2rolecreds.ProviderName) if err != nil { t.Fatalf("Getting account ID from EC2 metadata API failed: %s", err) } expectedPart := "aws" if part != expectedPart { t.Fatalf("Expected partition: %s, given: %s", expectedPart, part) } expectedAccountId := "123456789013" if id != expectedAccountId { t.Fatalf("Expected account ID: %s, given: %s", expectedAccountId, id) } } func TestAWSGetAccountInfo_shouldBeValid_fromIamUser(t *testing.T) { iamEndpoints := []*awsMockEndpoint{ { Request: &awsMockRequest{"POST", "/", "Action=GetUser&Version=2010-05-08"}, Response: &awsMockResponse{200, iamResponse_GetUser_valid, "text/xml"}, }, } closeIam, iamSess, err := getMockedAwsApiSession("IAM", iamEndpoints) defer closeIam() if err != nil { t.Fatal(err) } closeSts, stsSess, err := getMockedAwsApiSession("STS", []*awsMockEndpoint{}) defer closeSts() if err != nil { t.Fatal(err) } iamConn := iam.New(iamSess) stsConn := sts.New(stsSess) part, id, err := GetAccountInfo(iamConn, stsConn, "") if err != nil { t.Fatalf("Getting account ID via GetUser failed: %s", err) } expectedPart := "aws" if part != expectedPart { t.Fatalf("Expected partition: %s, given: %s", expectedPart, part) } expectedAccountId := "123456789012" if id != expectedAccountId { t.Fatalf("Expected account ID: %s, given: %s", expectedAccountId, id) } } func TestAWSGetAccountInfo_shouldBeValid_fromGetCallerIdentity(t *testing.T) { iamEndpoints := []*awsMockEndpoint{ { Request: &awsMockRequest{"POST", "/", "Action=GetUser&Version=2010-05-08"}, Response: &awsMockResponse{403, iamResponse_GetUser_unauthorized, "text/xml"}, }, } closeIam, iamSess, err := getMockedAwsApiSession("IAM", iamEndpoints) defer closeIam() if err != nil { t.Fatal(err) } stsEndpoints := []*awsMockEndpoint{ { Request: &awsMockRequest{"POST", "/", "Action=GetCallerIdentity&Version=2011-06-15"}, Response: &awsMockResponse{200, stsResponse_GetCallerIdentity_valid, "text/xml"}, }, } closeSts, stsSess, err := getMockedAwsApiSession("STS", stsEndpoints) defer closeSts() if err != nil { t.Fatal(err) } iamConn := iam.New(iamSess) stsConn := sts.New(stsSess) part, id, err := GetAccountInfo(iamConn, stsConn, "") if err != nil { t.Fatalf("Getting account ID via GetUser failed: %s", err) } expectedPart := "aws" if part != expectedPart { t.Fatalf("Expected partition: %s, given: %s", expectedPart, part) } expectedAccountId := "123456789012" if id != expectedAccountId { t.Fatalf("Expected account ID: %s, given: %s", expectedAccountId, id) } } func TestAWSGetAccountInfo_shouldBeValid_fromIamListRoles(t *testing.T) { iamEndpoints := []*awsMockEndpoint{ { Request: &awsMockRequest{"POST", "/", "Action=GetUser&Version=2010-05-08"}, Response: &awsMockResponse{403, iamResponse_GetUser_unauthorized, "text/xml"}, }, { Request: &awsMockRequest{"POST", "/", "Action=ListRoles&MaxItems=1&Version=2010-05-08"}, Response: &awsMockResponse{200, iamResponse_ListRoles_valid, "text/xml"}, }, } closeIam, iamSess, err := getMockedAwsApiSession("IAM", iamEndpoints) defer closeIam() if err != nil { t.Fatal(err) } stsEndpoints := []*awsMockEndpoint{ { Request: &awsMockRequest{"POST", "/", "Action=GetCallerIdentity&Version=2011-06-15"}, Response: &awsMockResponse{403, stsResponse_GetCallerIdentity_unauthorized, "text/xml"}, }, } closeSts, stsSess, err := getMockedAwsApiSession("STS", stsEndpoints) defer closeSts() if err != nil { t.Fatal(err) } iamConn := iam.New(iamSess) stsConn := sts.New(stsSess) part, id, err := GetAccountInfo(iamConn, stsConn, "") if err != nil { t.Fatalf("Getting account ID via ListRoles failed: %s", err) } expectedPart := "aws" if part != expectedPart { t.Fatalf("Expected partition: %s, given: %s", expectedPart, part) } expectedAccountId := "123456789012" if id != expectedAccountId { t.Fatalf("Expected account ID: %s, given: %s", expectedAccountId, id) } } func TestAWSGetAccountInfo_shouldBeValid_federatedRole(t *testing.T) { iamEndpoints := []*awsMockEndpoint{ { Request: &awsMockRequest{"POST", "/", "Action=GetUser&Version=2010-05-08"}, Response: &awsMockResponse{400, iamResponse_GetUser_federatedFailure, "text/xml"}, }, { Request: &awsMockRequest{"POST", "/", "Action=ListRoles&MaxItems=1&Version=2010-05-08"}, Response: &awsMockResponse{200, iamResponse_ListRoles_valid, "text/xml"}, }, } closeIam, iamSess, err := getMockedAwsApiSession("IAM", iamEndpoints) defer closeIam() if err != nil { t.Fatal(err) } closeSts, stsSess, err := getMockedAwsApiSession("STS", []*awsMockEndpoint{}) defer closeSts() if err != nil { t.Fatal(err) } iamConn := iam.New(iamSess) stsConn := sts.New(stsSess) part, id, err := GetAccountInfo(iamConn, stsConn, "") if err != nil { t.Fatalf("Getting account ID via ListRoles failed: %s", err) } expectedPart := "aws" if part != expectedPart { t.Fatalf("Expected partition: %s, given: %s", expectedPart, part) } expectedAccountId := "123456789012" if id != expectedAccountId { t.Fatalf("Expected account ID: %s, given: %s", expectedAccountId, id) } } func TestAWSGetAccountInfo_shouldError_unauthorizedFromIam(t *testing.T) { iamEndpoints := []*awsMockEndpoint{ { Request: &awsMockRequest{"POST", "/", "Action=GetUser&Version=2010-05-08"}, Response: &awsMockResponse{403, iamResponse_GetUser_unauthorized, "text/xml"}, }, { Request: &awsMockRequest{"POST", "/", "Action=ListRoles&MaxItems=1&Version=2010-05-08"}, Response: &awsMockResponse{403, iamResponse_ListRoles_unauthorized, "text/xml"}, }, } closeIam, iamSess, err := getMockedAwsApiSession("IAM", iamEndpoints) defer closeIam() if err != nil { t.Fatal(err) } closeSts, stsSess, err := getMockedAwsApiSession("STS", []*awsMockEndpoint{}) defer closeSts() if err != nil { t.Fatal(err) } iamConn := iam.New(iamSess) stsConn := sts.New(stsSess) part, id, err := GetAccountInfo(iamConn, stsConn, "") if err == nil { t.Fatal("Expected error when getting account ID") } if part != "" { t.Fatalf("Expected no partition, given: %s", part) } if id != "" { t.Fatalf("Expected no account ID, given: %s", id) } } func TestAWSParseAccountInfoFromArn(t *testing.T) { validArn := "arn:aws:iam::101636750127:instance-profile/aws-elasticbeanstalk-ec2-role" expectedPart := "aws" expectedId := "101636750127" part, id, err := parseAccountInfoFromArn(validArn) if err != nil { t.Fatalf("Expected no error when parsing valid ARN: %s", err) } if part != expectedPart { t.Fatalf("Parsed part doesn't match with expected (%q != %q)", part, expectedPart) } if id != expectedId { t.Fatalf("Parsed id doesn't match with expected (%q != %q)", id, expectedId) } invalidArn := "blablah" part, id, err = parseAccountInfoFromArn(invalidArn) if err == nil { t.Fatalf("Expected error when parsing invalid ARN (%q)", invalidArn) } } func TestAWSGetCredentials_shouldError(t *testing.T) { resetEnv := unsetEnv(t) defer resetEnv() cfg := Config{} c, err := GetCredentials(&cfg) if awsErr, ok := err.(awserr.Error); ok { if awsErr.Code() != "NoCredentialProviders" { t.Fatal("Expected NoCredentialProviders error") } } _, err = c.Get() if awsErr, ok := err.(awserr.Error); ok { if awsErr.Code() != "NoCredentialProviders" { t.Fatal("Expected NoCredentialProviders error") } } if err == nil { t.Fatal("Expected an error with empty env, keys, and IAM in AWS Config") } } func TestAWSGetCredentials_shouldBeStatic(t *testing.T) { simple := []struct { Key, Secret, Token string }{ { Key: "test", Secret: "secret", }, { Key: "test", Secret: "test", Token: "test", }, } for _, c := range simple { cfg := Config{ AccessKey: c.Key, SecretKey: c.Secret, Token: c.Token, } creds, err := GetCredentials(&cfg) if err != nil { t.Fatalf("Error gettings creds: %s", err) } if creds == nil { t.Fatal("Expected a static creds provider to be returned") } v, err := creds.Get() if err != nil { t.Fatalf("Error gettings creds: %s", err) } if v.AccessKeyID != c.Key { t.Fatalf("AccessKeyID mismatch, expected: (%s), got (%s)", c.Key, v.AccessKeyID) } if v.SecretAccessKey != c.Secret { t.Fatalf("SecretAccessKey mismatch, expected: (%s), got (%s)", c.Secret, v.SecretAccessKey) } if v.SessionToken != c.Token { t.Fatalf("SessionToken mismatch, expected: (%s), got (%s)", c.Token, v.SessionToken) } } } // TestAWSGetCredentials_shouldIAM is designed to test the scenario of running Terraform // from an EC2 instance, without environment variables or manually supplied // credentials. func TestAWSGetCredentials_shouldIAM(t *testing.T) { // clear AWS_* environment variables resetEnv := unsetEnv(t) defer resetEnv() // capture the test server's close method, to call after the test returns ts := awsEnv(t) defer ts() // An empty config, no key supplied cfg := Config{} creds, err := GetCredentials(&cfg) if err != nil { t.Fatalf("Error gettings creds: %s", err) } if creds == nil { t.Fatal("Expected a static creds provider to be returned") } v, err := creds.Get() if err != nil { t.Fatalf("Error gettings creds: %s", err) } if v.AccessKeyID != "somekey" { t.Fatalf("AccessKeyID mismatch, expected: (somekey), got (%s)", v.AccessKeyID) } if v.SecretAccessKey != "somesecret" { t.Fatalf("SecretAccessKey mismatch, expected: (somesecret), got (%s)", v.SecretAccessKey) } if v.SessionToken != "sometoken" { t.Fatalf("SessionToken mismatch, expected: (sometoken), got (%s)", v.SessionToken) } } // TestAWSGetCredentials_shouldIAM is designed to test the scenario of running Terraform // from an EC2 instance, without environment variables or manually supplied // credentials. func TestAWSGetCredentials_shouldIgnoreIAM(t *testing.T) { resetEnv := unsetEnv(t) defer resetEnv() // capture the test server's close method, to call after the test returns ts := awsEnv(t) defer ts() simple := []struct { Key, Secret, Token string }{ { Key: "test", Secret: "secret", }, { Key: "test", Secret: "test", Token: "test", }, } for _, c := range simple { cfg := Config{ AccessKey: c.Key, SecretKey: c.Secret, Token: c.Token, } creds, err := GetCredentials(&cfg) if err != nil { t.Fatalf("Error gettings creds: %s", err) } if creds == nil { t.Fatal("Expected a static creds provider to be returned") } v, err := creds.Get() if err != nil { t.Fatalf("Error gettings creds: %s", err) } if v.AccessKeyID != c.Key { t.Fatalf("AccessKeyID mismatch, expected: (%s), got (%s)", c.Key, v.AccessKeyID) } if v.SecretAccessKey != c.Secret { t.Fatalf("SecretAccessKey mismatch, expected: (%s), got (%s)", c.Secret, v.SecretAccessKey) } if v.SessionToken != c.Token { t.Fatalf("SessionToken mismatch, expected: (%s), got (%s)", c.Token, v.SessionToken) } } } func TestAWSGetCredentials_shouldErrorWithInvalidEndpoint(t *testing.T) { resetEnv := unsetEnv(t) defer resetEnv() // capture the test server's close method, to call after the test returns ts := invalidAwsEnv(t) defer ts() creds, err := GetCredentials(&Config{}) if err != nil { t.Fatalf("Error gettings creds: %s", err) } if creds == nil { t.Fatal("Expected a static creds provider to be returned") } v, err := creds.Get() if err == nil { t.Fatal("Expected error returned when getting creds w/ invalid EC2 endpoint") } if v.ProviderName != "" { t.Fatalf("Expected provider name to be empty, %q given", v.ProviderName) } } func TestAWSGetCredentials_shouldIgnoreInvalidEndpoint(t *testing.T) { resetEnv := unsetEnv(t) defer resetEnv() // capture the test server's close method, to call after the test returns ts := invalidAwsEnv(t) defer ts() creds, err := GetCredentials(&Config{AccessKey: "accessKey", SecretKey: "secretKey"}) if err != nil { t.Fatalf("Error gettings creds: %s", err) } v, err := creds.Get() if err != nil { t.Fatalf("Getting static credentials w/ invalid EC2 endpoint failed: %s", err) } if creds == nil { t.Fatal("Expected a static creds provider to be returned") } if v.ProviderName != "StaticProvider" { t.Fatalf("Expected provider name to be %q, %q given", "StaticProvider", v.ProviderName) } if v.AccessKeyID != "accessKey" { t.Fatalf("Static Access Key %q doesn't match: %s", "accessKey", v.AccessKeyID) } if v.SecretAccessKey != "secretKey" { t.Fatalf("Static Secret Key %q doesn't match: %s", "secretKey", v.SecretAccessKey) } } func TestAWSGetCredentials_shouldCatchEC2RoleProvider(t *testing.T) { resetEnv := unsetEnv(t) defer resetEnv() // capture the test server's close method, to call after the test returns ts := awsEnv(t) defer ts() creds, err := GetCredentials(&Config{}) if err != nil { t.Fatalf("Error gettings creds: %s", err) } if creds == nil { t.Fatal("Expected an EC2Role creds provider to be returned") } v, err := creds.Get() if err != nil { t.Fatalf("Expected no error when getting creds: %s", err) } expectedProvider := "EC2RoleProvider" if v.ProviderName != expectedProvider { t.Fatalf("Expected provider name to be %q, %q given", expectedProvider, v.ProviderName) } } var credentialsFileContents = `[myprofile] aws_access_key_id = accesskey aws_secret_access_key = secretkey ` func TestAWSGetCredentials_shouldBeShared(t *testing.T) { file, err := ioutil.TempFile(os.TempDir(), "terraform_aws_cred") if err != nil { t.Fatalf("Error writing temporary credentials file: %s", err) } _, err = file.WriteString(credentialsFileContents) if err != nil { t.Fatalf("Error writing temporary credentials to file: %s", err) } err = file.Close() if err != nil { t.Fatalf("Error closing temporary credentials file: %s", err) } defer os.Remove(file.Name()) resetEnv := unsetEnv(t) defer resetEnv() if err := os.Setenv("AWS_PROFILE", "myprofile"); err != nil { t.Fatalf("Error resetting env var AWS_PROFILE: %s", err) } if err := os.Setenv("AWS_SHARED_CREDENTIALS_FILE", file.Name()); err != nil { t.Fatalf("Error resetting env var AWS_SHARED_CREDENTIALS_FILE: %s", err) } creds, err := GetCredentials(&Config{Profile: "myprofile", CredsFilename: file.Name()}) if err != nil { t.Fatalf("Error gettings creds: %s", err) } if creds == nil { t.Fatal("Expected a provider chain to be returned") } v, err := creds.Get() if err != nil { t.Fatalf("Error gettings creds: %s", err) } if v.AccessKeyID != "accesskey" { t.Fatalf("AccessKeyID mismatch, expected (%s), got (%s)", "accesskey", v.AccessKeyID) } if v.SecretAccessKey != "secretkey" { t.Fatalf("SecretAccessKey mismatch, expected (%s), got (%s)", "accesskey", v.AccessKeyID) } } func TestAWSGetCredentials_shouldBeENV(t *testing.T) { // need to set the environment variables to a dummy string, as we don't know // what they may be at runtime without hardcoding here s := "some_env" resetEnv := setEnv(s, t) defer resetEnv() cfg := Config{} creds, err := GetCredentials(&cfg) if err != nil { t.Fatalf("Error gettings creds: %s", err) } if creds == nil { t.Fatalf("Expected a static creds provider to be returned") } v, err := creds.Get() if err != nil { t.Fatalf("Error gettings creds: %s", err) } if v.AccessKeyID != s { t.Fatalf("AccessKeyID mismatch, expected: (%s), got (%s)", s, v.AccessKeyID) } if v.SecretAccessKey != s { t.Fatalf("SecretAccessKey mismatch, expected: (%s), got (%s)", s, v.SecretAccessKey) } if v.SessionToken != s { t.Fatalf("SessionToken mismatch, expected: (%s), got (%s)", s, v.SessionToken) } } // unsetEnv unsets environment variables for testing a "clean slate" with no // credentials in the environment func unsetEnv(t *testing.T) func() { // Grab any existing AWS keys and preserve. In some tests we'll unset these, so // we need to have them and restore them after e := getEnv() if err := os.Unsetenv("AWS_ACCESS_KEY_ID"); err != nil { t.Fatalf("Error unsetting env var AWS_ACCESS_KEY_ID: %s", err) } if err := os.Unsetenv("AWS_SECRET_ACCESS_KEY"); err != nil { t.Fatalf("Error unsetting env var AWS_SECRET_ACCESS_KEY: %s", err) } if err := os.Unsetenv("AWS_SESSION_TOKEN"); err != nil { t.Fatalf("Error unsetting env var AWS_SESSION_TOKEN: %s", err) } if err := os.Unsetenv("AWS_PROFILE"); err != nil { t.Fatalf("Error unsetting env var AWS_PROFILE: %s", err) } if err := os.Unsetenv("AWS_SHARED_CREDENTIALS_FILE"); err != nil { t.Fatalf("Error unsetting env var AWS_SHARED_CREDENTIALS_FILE: %s", err) } return func() { // re-set all the envs we unset above if err := os.Setenv("AWS_ACCESS_KEY_ID", e.Key); err != nil { t.Fatalf("Error resetting env var AWS_ACCESS_KEY_ID: %s", err) } if err := os.Setenv("AWS_SECRET_ACCESS_KEY", e.Secret); err != nil { t.Fatalf("Error resetting env var AWS_SECRET_ACCESS_KEY: %s", err) } if err := os.Setenv("AWS_SESSION_TOKEN", e.Token); err != nil { t.Fatalf("Error resetting env var AWS_SESSION_TOKEN: %s", err) } if err := os.Setenv("AWS_PROFILE", e.Profile); err != nil { t.Fatalf("Error resetting env var AWS_PROFILE: %s", err) } if err := os.Setenv("AWS_SHARED_CREDENTIALS_FILE", e.CredsFilename); err != nil { t.Fatalf("Error resetting env var AWS_SHARED_CREDENTIALS_FILE: %s", err) } } } func setEnv(s string, t *testing.T) func() { e := getEnv() // Set all the envs to a dummy value if err := os.Setenv("AWS_ACCESS_KEY_ID", s); err != nil { t.Fatalf("Error setting env var AWS_ACCESS_KEY_ID: %s", err) } if err := os.Setenv("AWS_SECRET_ACCESS_KEY", s); err != nil { t.Fatalf("Error setting env var AWS_SECRET_ACCESS_KEY: %s", err) } if err := os.Setenv("AWS_SESSION_TOKEN", s); err != nil { t.Fatalf("Error setting env var AWS_SESSION_TOKEN: %s", err) } if err := os.Setenv("AWS_PROFILE", s); err != nil { t.Fatalf("Error setting env var AWS_PROFILE: %s", err) } if err := os.Setenv("AWS_SHARED_CREDENTIALS_FILE", s); err != nil { t.Fatalf("Error setting env var AWS_SHARED_CREDENTIALS_FLE: %s", err) } return func() { // re-set all the envs we unset above if err := os.Setenv("AWS_ACCESS_KEY_ID", e.Key); err != nil { t.Fatalf("Error resetting env var AWS_ACCESS_KEY_ID: %s", err) } if err := os.Setenv("AWS_SECRET_ACCESS_KEY", e.Secret); err != nil { t.Fatalf("Error resetting env var AWS_SECRET_ACCESS_KEY: %s", err) } if err := os.Setenv("AWS_SESSION_TOKEN", e.Token); err != nil { t.Fatalf("Error resetting env var AWS_SESSION_TOKEN: %s", err) } if err := os.Setenv("AWS_PROFILE", e.Profile); err != nil { t.Fatalf("Error setting env var AWS_PROFILE: %s", err) } if err := os.Setenv("AWS_SHARED_CREDENTIALS_FILE", s); err != nil { t.Fatalf("Error setting env var AWS_SHARED_CREDENTIALS_FLE: %s", err) } } } // awsEnv establishes a httptest server to mock out the internal AWS Metadata // service. IAM Credentials are retrieved by the EC2RoleProvider, which makes // API calls to this internal URL. By replacing the server with a test server, // we can simulate an AWS environment func awsEnv(t *testing.T) func() { routes := routes{} if err := json.Unmarshal([]byte(metadataApiRoutes), &routes); err != nil { t.Fatalf("Failed to unmarshal JSON in AWS ENV test: %s", err) } ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { w.Header().Set("Content-Type", "text/plain") w.Header().Add("Server", "MockEC2") log.Printf("[DEBUG] Mocker server received request to %q", r.RequestURI) for _, e := range routes.Endpoints { if r.RequestURI == e.Uri { fmt.Fprintln(w, e.Body) w.WriteHeader(200) return } } w.WriteHeader(400) })) os.Setenv("AWS_METADATA_URL", ts.URL+"/latest") return ts.Close } // invalidAwsEnv establishes a httptest server to simulate behaviour // when endpoint doesn't respond as expected func invalidAwsEnv(t *testing.T) func() { ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { w.WriteHeader(400) })) os.Setenv("AWS_METADATA_URL", ts.URL+"/latest") return ts.Close } func getEnv() *currentEnv { // Grab any existing AWS keys and preserve. In some tests we'll unset these, so // we need to have them and restore them after return ¤tEnv{ Key: os.Getenv("AWS_ACCESS_KEY_ID"), Secret: os.Getenv("AWS_SECRET_ACCESS_KEY"), Token: os.Getenv("AWS_SESSION_TOKEN"), Profile: os.Getenv("AWS_PROFILE"), CredsFilename: os.Getenv("AWS_SHARED_CREDENTIALS_FILE"), } } // struct to preserve the current environment type currentEnv struct { Key, Secret, Token, Profile, CredsFilename string } type routes struct { Endpoints []*endpoint `json:"endpoints"` } type endpoint struct { Uri string `json:"uri"` Body string `json:"body"` } const metadataApiRoutes = ` { "endpoints": [ { "uri": "/latest/meta-data/instance-id", "body": "mock-instance-id" }, { "uri": "/latest/meta-data/iam/info", "body": "{\"Code\": \"Success\",\"LastUpdated\": \"2016-03-17T12:27:32Z\",\"InstanceProfileArn\": \"arn:aws:iam::123456789013:instance-profile/my-instance-profile\",\"InstanceProfileId\": \"AIPAABCDEFGHIJKLMN123\"}" }, { "uri": "/latest/meta-data/iam/security-credentials", "body": "test_role" }, { "uri": "/latest/meta-data/iam/security-credentials/test_role", "body": "{\"Code\":\"Success\",\"LastUpdated\":\"2015-12-11T17:17:25Z\",\"Type\":\"AWS-HMAC\",\"AccessKeyId\":\"somekey\",\"SecretAccessKey\":\"somesecret\",\"Token\":\"sometoken\"}" } ] } ` const iamResponse_GetUser_valid = ` AIDACKCEVSQ6C2EXAMPLE /division_abc/subdivision_xyz/ Bob arn:aws:iam::123456789012:user/division_abc/subdivision_xyz/Bob 2013-10-02T17:01:44Z 2014-10-10T14:37:51Z 7a62c49f-347e-4fc4-9331-6e8eEXAMPLE ` const iamResponse_GetUser_unauthorized = ` Sender AccessDenied User: arn:aws:iam::123456789012:user/Bob is not authorized to perform: iam:GetUser on resource: arn:aws:iam::123456789012:user/Bob 7a62c49f-347e-4fc4-9331-6e8eEXAMPLE ` const stsResponse_GetCallerIdentity_valid = ` arn:aws:iam::123456789012:user/Alice AKIAI44QH8DHBEXAMPLE 123456789012 01234567-89ab-cdef-0123-456789abcdef ` const stsResponse_GetCallerIdentity_unauthorized = ` Sender AccessDenied User: arn:aws:iam::123456789012:user/Bob is not authorized to perform: sts:GetCallerIdentity 01234567-89ab-cdef-0123-456789abcdef ` const iamResponse_GetUser_federatedFailure = ` Sender ValidationError Must specify userName when calling with non-User credentials 7a62c49f-347e-4fc4-9331-6e8eEXAMPLE ` const iamResponse_ListRoles_valid = ` true AWceSSsKsazQ4IEplT9o4hURCzBs00iavlEvEXAMPLE / %7B%22Version%22%3A%222008-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22Service%22%3A%22ec2.amazonaws.com%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D AROACKCEVSQ6C2EXAMPLE elasticbeanstalk-role arn:aws:iam::123456789012:role/elasticbeanstalk-role 2013-10-02T17:01:44Z 7a62c49f-347e-4fc4-9331-6e8eEXAMPLE ` const iamResponse_ListRoles_unauthorized = ` Sender AccessDenied User: arn:aws:iam::123456789012:user/Bob is not authorized to perform: iam:ListRoles on resource: arn:aws:iam::123456789012:role/ 7a62c49f-347e-4fc4-9331-6e8eEXAMPLE `